Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Groups
  3. Whitefly

Whitefly

Whitefly is a cyber espionage group that has been operating since at least 2017. The group has targeted organizations based mostly in Singapore across a wide variety of sectors, and is primarily interested in stealing large amounts of sensitive information. The group has been linked to an attack against Singapore’s largest public health organization, SingHealth.[1]

ID: G0107
Version: 1.2
Created: 26 May 2020
Last Modified: 10 April 2024
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1059Command and Scripting Interpreter

Whitefly has used a simple remote shell tool that will call back to the C2 server and wait for commands.[1]

EnterpriseT1068Exploitation for Privilege Escalation

Whitefly has used an open-source tool to exploit a known Windows privilege escalation vulnerability (CVE-2016-0051) on unpatched computers.[1]

EnterpriseT1574.001Hijack Execution Flow:DLL

Whitefly has used search order hijacking to run the loader Vcrodat.[1]

EnterpriseT1105Ingress Tool Transfer

Whitefly has the ability to download additional tools from the C2.[1]

EnterpriseT1036.005Masquerading:Match Legitimate Resource Name or Location

Whitefly has named the malicious DLL the same name as DLLs belonging to legitimate software from various security vendors.[1]

EnterpriseT1027.013Obfuscated Files or Information:Encrypted/Encoded File

Whitefly has encrypted the payload used for C2.[1]

EnterpriseT1588.002Obtain Capabilities:Tool

Whitefly has obtained and used tools such asMimikatz.[1]

EnterpriseT1003.001OS Credential Dumping:LSASS Memory

Whitefly has usedMimikatz to obtain credentials.[1]

EnterpriseT1204.002User Execution:Malicious File

Whitefly has used malicious .exe or .dll files disguised as documents or images.[1]

Software

References

×

[8]ページ先頭

©2009-2026 Movatter.jp